The JustPod: A murder-for-hire allegation, public corruption trial, and notable acquittal
Bar Exam Toolbox Podcast Episode 309: Listen and Learn -- Felony Murder and Causation (Criminal Law)
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Podcast - The 3 Core Themes of Trial Law: Do the Right Thing
Aligning Business Goals with Legal Strategies Amid Regulatory Change – Speaking of Litigation Video Podcast
House Final Settlement Hearing: Key Insights and Future Implications for NIL — Highway to NIL Podcast
The 3 Core Themes of Trial Law: Tell Your Story
What Were the Cooler Wars? (Part 2) — No Infringement Intended Podcast
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
The JustPod: Lawyer, Gentleman, and Counsel to the Stars: A Discussion with Brian McMonagle
The Subpoena Playbook
Podcast - The 3 Core Themes of Trial Law: Know Your Court
Podcast - Real Justice for Real People
The Briefing: Diana Copeland – “Surviving R. Kelly” But Not Netflix’s Motion to Dismiss
(Podcast) The Briefing: Diana Copeland – “Surviving R. Kelly” But Not Netflix’s Motion to Dismiss
Key Discovery Points: Timing is Mostly Everything in eDiscovery
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
There Is No Right Path
As recent high-profile litigation, government investigations, and large-scale data-security incidents have shown, organizations are often thrust into crisis mode, requiring rapid responses and close collaboration with third...more
There is no doubt that high-stakes litigation is a team sport. Among myriad experts that come to the table for the client, litigation communications professionals are becoming more essential than ever. To help manage the...more
In our last newsletter, we analyzed the reluctance of courts to apply privilege to the work of forensic computer consultants following data breaches. Here, we address often unavailing efforts to fit communications with...more
Social media has become part of our daily lives. Information is routinely disseminated in the public sphere via Facebook, Twitter, Instagram and other social media outlets. It is therefore no surprise that we often see high...more
The situation has become all too familiar: an incident of prurient interest — whether actual or falsely alleged — goes viral on social media before university officials can even ascertain the names of the parties involved. ...more